Articles with "based security" as a keyword



Photo by scottwebb from unsplash

A collaborative policy-based security scheme to enforce resource access controlling mechanism

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Networks"

DOI: 10.1007/s11276-019-01984-x

Abstract: Advances in both telecommunications and Information technology have improved the way users do business online. Android, an open-source mobile operating system, is becoming an attractive target for cyber criminals to exploit due to its predefined… read more here.

Keywords: policy based; collaborative policy; based security; security scheme ... See more keywords
Photo from wikipedia

Blockchain-Based Security Enhancement and Spectrum Sensing in Cognitive Radio Network

Sign Up to like & get
recommendations!
Published in 2021 at "Wireless Personal Communications"

DOI: 10.1007/s11277-021-08729-0

Abstract: In recent times, wireless communication systems have been considered by a fixed spectrum allocation policy, where administrative agencies provide wireless spectrum to licensees on a long-term basis for high geographical areas. Cognitive radio networks (CRN)… read more here.

Keywords: blockchain based; based security; spectrum; network ... See more keywords
Photo from wikipedia

A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets

Sign Up to like & get
recommendations!
Published in 2021 at "Sustainable Cities and Society"

DOI: 10.1016/j.scs.2021.102994

Abstract: Abstract While there has been a significant interest in understanding the cyber threat landscape of Internet of Things (IoT) networks, and the design of Artificial Intelligence (AI)-based security approaches, there is a lack of distributed… read more here.

Keywords: based security; architecture; iot; network ... See more keywords

Fluorescent and magnetic anti-counterfeiting realized by biocompatible multifunctional silicon nanoshuttle-based security ink.

Sign Up to like & get
recommendations!
Published in 2018 at "Nanoscale"

DOI: 10.1039/c7nr06337g

Abstract: Herein, we present the first example of a silicon nanoshuttle-based security ink simultaneously featuring attractive optical and magnetic properties, suitable for fluorescent and magnetic anti-counterfeiting and encryption. Significantly, the information can be dual-encrypted through multi-color… read more here.

Keywords: security ink; anti counterfeiting; nanoshuttle based; based security ... See more keywords
Photo by lukaszlada from unsplash

Fuzzy-based Security-Driven Optimistic Scheduling of Scientific Workflows in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2020 at "IETE Journal of Research"

DOI: 10.1080/03772063.2018.1486740

Abstract: ABSTRACT Cloud computing is a new computing paradigm which is gaining wide acceptance among scientific fraternity in the recent years. The services of cloud could be effectively used for running large-scale data and computation-intensive scientific… read more here.

Keywords: schedule; cloud computing; fuzzy based; security ... See more keywords
Photo by markusspiske from unsplash

The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3078072

Abstract: This article presents research challenges and a tutorial on performance evaluation of blockchain-based security and privacy systems for the Internet of Things (IoT). We start by summarizing the existing surveys that deal with blockchain security… read more here.

Keywords: blockchain based; privacy systems; based security; security privacy ... See more keywords
Photo by scottwebb from unsplash

Systematic literature review on designing trust-based security for WSNs

Sign Up to like & get
recommendations!
Published in 2019 at "Indonesian Journal of Electrical Engineering and Computer Science"

DOI: 10.11591/ijeecs.v14.i3.pp1395-1404

Abstract: The study assessed the design and development of trust-based security for wireless sensor networks. A qualitative approach was opted by employing systematic review analysis, which was assessed using secondary data collection. The design and development… read more here.

Keywords: trust; based security; review; trust based ... See more keywords